A.Inoculate systems by applying update patches.
B.Limit traffic rate.
C.Apply authentication.
D.Quarantine infected machines.
E.Enable anti-spoof measures.
您可能感興趣的試卷
你可能感興趣的試題
A.Transparent tunneling must be enabled.
B.A valid root certificate must be installed.
C.A group pre-shared secret must be properly configured.
D.The option to "Allow Local LAN Access" must be selected.
A.mode configuration
B.the VPN client establishment of an ISAKMP SA
C.IPsec quick mode completion of the connection
D.VPN client initiation of the IKE phase 1 process
A.DDoS signatures
B.strong signatures
C.exploit signatures
D.numeric signatures
E.spoofing signatures
F.connection signatures
A.The IPS is in the traffic path.
B.Only one active interface is required.
C.Full benefit of an IPS will not be realized unless deployed in conjunction with an IDS.
D.When malicious traffic is detected,the IPS will only send an alert to a management station.
A.The IDS is in the traffic path.
B.The IDS can send TCP resets to the source device.
C.The IDS can send TCP resets to the destination device.
D.The IDS listens promiscuously to all traffic on the network.
E.Default operation is for the IDS to discard malicious traffic.
最新試題
Which two statements are true about broadband cable (HFC) systems?()
Which statement is true when ICMP echo and echo-reply are disabled on edge devices?()
Which two mechanisms can be used to detect IPsec GRE tunnel failures?()
Which three MPLS statements are true?()
Which statement is true about a worm attack?()
Which statement describes the Authentication Proxy feature?()
Which three techniques should be used to secure management protocols?()
Refer to the exhibit. Which statement is true about the partial MPLS configuration that is shown?()
Refer to the exhibit.What are the two options that are used to provide High Availability IPsec?()
Which three statements about IOS Firewall configurations are true?()